Flux-runtime is an active research project under continuous development. We do not maintain separate long-term support branches at this time. Please use the latest commit on the main branch.
Flux-runtime is an open-source research runtime — not production security software. That said, we take security seriously and welcome responsible disclosure of any issues you find.
Please do NOT open a public issue for security vulnerabilities.
Instead, please report them through one of these channels:
-
Preferred — GitHub Security Advisories (private, only project maintainers can see it until a CVE is published).
-
Alternative — Email
superinstance@githubwith the subject line[flux-runtime security]and include as much detail as possible:- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fix (optional but appreciated)
- We will acknowledge receipt within 5 business days.
- We will investigate and aim to provide a status update within 14 days.
- If the report is accepted, we will work on a fix and coordinate disclosure.
- We will credit researchers in our release notes unless anonymity is requested.
We consider the following in scope for security reports:
- Arbitrary code execution through crafted inputs or malicious packages
- Sandboxing escapes in the FLUX VM or capability system
- Denial-of-service vulnerabilities (unbounded resource consumption)
- Information leakage between isolated agents or tiles
- Tampering with the bytecode encoder/decoder pipeline
Out of scope:
- Issues in third-party dependencies (please report upstream)
- Typo / documentation errors
- Feature requests